By code-acquiring, i mean the code that we will need very soon, after @Alley is done.

So, it's this simple.
Make a new page on the website call it Verification, Join, Personal Code, etc. what ever you come up with, and what not.
This page would look kinda like what I drew, below (***** photo but you get the point)

Idk what the questions will be asked, those are just for ideas. But basically,

go for like a youtube/twitch streaming key kinda deal.
Make it fit with the site and what not.
Then you can have it all go to like a "table" where you have a list of people where you can click "View Verification" and then generate code,
they'd get a private message saying " you've been confirmed, follow the instructions below the code to play the server"

and wazabambam. Doing it on a forum post, is, much more messy, and probably will be more time consuming because you'll have to find out "did we already do this guy, idk, just give him a new code" -- Tries to log in, and fails.

(12-24-2016, 11:18 AM)Misfit Wrote: How does this prevent the hacker (or hackers) from making their own fake account with fake information and obtaining a key that way?

The idea, is to make it easier to look at the content, and provide a key. Because, if they need to "verify" everyone, that will be a time consuming process. Make it easier, and it'll be quicker. Not saying admins should just poke in skim and generate. I am just saying, it would be easier to control everything, rather than a forum post.

And again, there's nothing much that they can do to prevent hackers. This game is old. There's a limit to what You can do.

Any malicious programmer determined enough to achieve their goals will find a way. More rigorous verification will only create more work for administrators and developers and deter potential players who aren't interested in filling out forms just to play a game.

Verification processes are meant to stop bots and deter people without an essential understanding of the server's language (English). There's no way to identify a hacker unless you have a list of hackers' IPs and you can cross-reference them on this list.

This would do little to stop a hacker who has some understanding of VPNs, and even less to stop an attack as widespread as a DDoS.